Sciweavers

6861 search results - page 70 / 1373
» Security for Ubiquitous Computing
Sort
View
ESORICS
2009
Springer
15 years 10 months ago
Using SAT-Solvers to Compute Inference-Proof Database Instances
Cornelia Tadros, Lena Wiese
113
Voted
HOST
2008
IEEE
15 years 10 months ago
Reassessing the TCG Specifications for Trusted Computing in Mobile and Embedded Systems
Johann Großschädl, Tobias Vejda, Dan Pa...
ACISP
2008
Springer
15 years 10 months ago
A Tree-Based Approach for Computing Double-Base Chains
Christophe Doche, Laurent Habsieger
109
Voted
CCS
2007
ACM
15 years 10 months ago
Trusted computing challenges
Leendert van Doorn
CSFW
1997
IEEE
15 years 8 months ago
Unreliable Intrusion Detection in Distributed Computations
Dahlia Malkhi, Michael K. Reiter